DEVELOPMENT OF AN ENHANCED PELICAN RSA ENCRYPTION TECHNIQUE FOR DATA SECURITY SYSTEM

Babatunde Victor Feyiseto, Adeyemo Isiaka Akinkunmi, Jeremiah Yetomiwa Sinat, Ajala funmilola Alaba

Abstract


In today’s digital world, strong data security is crucial, focusing on confidentiality, authentication, integrity, and non-repudiation. The Rivest-Shamir-Adleman (RSA) algorithm, a key public-key cryptographic method, secures communication based on the difficulty of prime factorization. However, its security and efficiency face threats from advanced factorization techniques. This study enhances RSA by integrating the Pelican Optimization Algorithm (POA), a nature-inspired metaheuristic, to optimize key generation and parameters boosting both security and performance. The Pelican RSA cryptosystem for image security was developed using a structured approach. The dataset which consists of 25 medical images were gotten from public sources, were pre-processed and converted to JPEG format. The encryption task was defined, and the Pelican Optimization Algorithm (POA) was integrated with RSA to improve key generation and encryption. Images were divided into blocks and encrypted individually using the optimized RSA. A MATLAB 2020a GUI was built for user interaction. POA-enhanced RSA was compared to traditional RSA using encryption time, decryption time, throughput and memory size. Decrypted images were reconstructed to verify accuracy and effectiveness.  The results of the evaluation and comparison indicate that Pelican RSA achieved reduction in encryption time from 9.45–19.93s to 4.48–8.89s, decryption time from 11.54s to 4.61s and boosts throughput from 3.57–7.51 kb/s to 9.50–14.99 kb/s. Although it uses slightly more memory (678 KB vs. 569 KB), this is justified by its speed and efficiency.

This study shows that using the Pelican Optimization Algorithm (POA) greatly improves RSA cryptosystem security. POA enhances key generation and parameter tuning, boosting resistance to prime factorization attacks. This makes RSA more reliable for secure online communication. The core contribution is applying a nature inspired optimization method to strengthen public-key cryptography.

Keywords: Authentication, integrity, and non-repudiation, Pelican Optimization, Algorithm-based

DOI: 10.7176/JIEA/15-2-07

Publication date: August 28th 2025

 


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org